IL323568A - System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems - Google Patents
System and method for securely distributing authenticated and trusted data streams to artificial intelligence systemsInfo
- Publication number
- IL323568A IL323568A IL323568A IL32356825A IL323568A IL 323568 A IL323568 A IL 323568A IL 323568 A IL323568 A IL 323568A IL 32356825 A IL32356825 A IL 32356825A IL 323568 A IL323568 A IL 323568A
- Authority
- IL
- Israel
- Prior art keywords
- kds
- key
- psk
- identifier
- application
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (14)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202363454612P | 2023-03-24 | 2023-03-24 | |
| US18/130,942 US11968302B1 (en) | 2023-03-24 | 2023-04-05 | Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator |
| US18/139,508 US12301563B2 (en) | 2023-03-24 | 2023-04-26 | System and method for pre-shared key (PSK) based wireless access point authentication |
| US18/139,498 US12261838B2 (en) | 2023-03-24 | 2023-04-26 | System and method for pre-shared key (PSK) based content signing for tamper resistance |
| US18/139,480 US12470372B2 (en) | 2023-03-24 | 2023-04-26 | System and method for pre-shared key (PSK) based secure communications with mobile service provider authenticator |
| US18/139,486 US12368580B2 (en) | 2023-03-24 | 2023-04-26 | System and method for pre-shared key (PSK) based selective encryption of partial sections of messages |
| US18/139,494 US12309262B2 (en) | 2023-03-24 | 2023-04-26 | System and method for pre-shared key (PSK) based document security |
| US18/139,500 US12463802B2 (en) | 2023-03-24 | 2023-04-26 | System and method for pre-shared key (PSK) based supply chain tamper resistance |
| US18/206,399 US11882117B1 (en) | 2023-03-24 | 2023-06-06 | System and method for device label scan based zero touch device onboarding and device directory service |
| US18/206,426 US11936772B1 (en) | 2023-03-24 | 2023-06-06 | System and method for supply chain tamper resistant content verification, inspection, and approval |
| US18/377,866 US12015721B1 (en) | 2023-03-24 | 2023-10-09 | System and method for dynamic retrieval of certificates with remote lifecycle management |
| US18/435,253 US12132846B2 (en) | 2023-03-24 | 2024-02-07 | System and method for extended attributes in certificates for dynamic authorization |
| US18/438,586 US12476793B2 (en) | 2023-03-24 | 2024-02-12 | System and method to securely distribute authenticated and trusted data streams to AI systems |
| PCT/US2024/021119 WO2025159775A2 (en) | 2023-03-24 | 2024-03-22 | System and method to securely distribute authenticated and trusted data streams to ai systems |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IL323568A true IL323568A (en) | 2025-11-01 |
Family
ID=96545976
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IL323568A IL323568A (en) | 2023-03-24 | 2025-09-25 | System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP4690664A2 (de) |
| IL (1) | IL323568A (de) |
| WO (1) | WO2025159775A2 (de) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12554948B2 (en) * | 2020-02-11 | 2026-02-17 | Avid Identification Systems, Inc. | Method for validating radio frequency identification number |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6959384B1 (en) * | 1999-12-14 | 2005-10-25 | Intertrust Technologies Corporation | Systems and methods for authenticating and protecting the integrity of data streams and other data |
| JP3992579B2 (ja) * | 2002-10-01 | 2007-10-17 | 富士通株式会社 | 鍵交換代理ネットワークシステム |
| US20130227286A1 (en) * | 2006-04-25 | 2013-08-29 | Andre Jacques Brisson | Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud |
| US8332923B2 (en) * | 2007-01-19 | 2012-12-11 | Toshiba America Research, Inc. | Kerberized handover keying |
| US8983066B2 (en) * | 2009-02-27 | 2015-03-17 | Cisco Technology, Inc. | Private pairwise key management for groups |
| EP3496334B2 (de) * | 2012-04-27 | 2023-11-08 | InterDigital Patent Holdings, Inc. | Verfahren und system zur unterstützung von näherungserkennungsverfahren |
| US10079682B2 (en) * | 2015-12-22 | 2018-09-18 | Gemalto Sa | Method for managing a trusted identity |
| GB201611948D0 (en) * | 2016-07-08 | 2016-08-24 | Kalypton Int Ltd | Distributed transcation processing and authentication system |
| EP3291504B1 (de) * | 2016-08-30 | 2020-03-11 | Wacom Co., Ltd. | Authentifizierung und sichere übertragung von daten zwischen unterschriften- und host-computern mit transport-schicht-sicherheit |
| US10530860B2 (en) * | 2017-06-30 | 2020-01-07 | Microsoft Technology Licensing, Llc | Single multi-instance tenant computing system |
| US10943005B2 (en) * | 2017-11-22 | 2021-03-09 | Aeris Communications, Inc. | Secure authentication of devices for internet of things |
| US11269786B2 (en) * | 2018-07-25 | 2022-03-08 | Intel Corporation | Memory data protection based on authenticated encryption |
| US11399283B2 (en) * | 2018-11-21 | 2022-07-26 | Cisco Technology, Inc. | Tenant service set identifiers (SSIDs) |
| US12476793B2 (en) * | 2023-03-24 | 2025-11-18 | Symmera Inc. | System and method to securely distribute authenticated and trusted data streams to AI systems |
| US11968302B1 (en) * | 2023-03-24 | 2024-04-23 | Srinivas Kumar | Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator |
| US12132846B2 (en) * | 2023-03-24 | 2024-10-29 | Symmera Inc. | System and method for extended attributes in certificates for dynamic authorization |
| US12015721B1 (en) * | 2023-03-24 | 2024-06-18 | Srinivas Kumar | System and method for dynamic retrieval of certificates with remote lifecycle management |
-
2024
- 2024-03-22 EP EP24920503.0A patent/EP4690664A2/de active Pending
- 2024-03-22 WO PCT/US2024/021119 patent/WO2025159775A2/en not_active Ceased
-
2025
- 2025-09-25 IL IL323568A patent/IL323568A/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| EP4690664A2 (de) | 2026-02-11 |
| WO2025159775A3 (en) | 2025-10-16 |
| WO2025159775A2 (en) | 2025-07-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11936772B1 (en) | System and method for supply chain tamper resistant content verification, inspection, and approval | |
| US12132846B2 (en) | System and method for extended attributes in certificates for dynamic authorization | |
| US12476793B2 (en) | System and method to securely distribute authenticated and trusted data streams to AI systems | |
| US12015721B1 (en) | System and method for dynamic retrieval of certificates with remote lifecycle management | |
| JP7267294B2 (ja) | トランザクションコネクタ及びブローカサービスを使用してブロックチェーンネットワークのバージョン化されたブロックとしてデバイスライフサイクルトランザクションを記録するためのシステム及び方法 | |
| JP7267293B2 (ja) | 接続されたエンドポイントデバイスのエンロールメント及び登録のためのデバイス識別のシステム及び方法、ならびにブロックチェーンサービス | |
| US11606198B2 (en) | Centrally managed PKI provisioning and rotation | |
| Oktian et al. | BorderChain: Blockchain-based access control framework for the Internet of Things endpoint | |
| CN108604985A (zh) | 数据传送方法、控制数据使用的方法以及密码设备 | |
| US12019778B1 (en) | Systems and methods to perform end to end encryption | |
| CN110771087B (zh) | 私钥更新 | |
| IL323568A (en) | System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems | |
| US20240297792A1 (en) | System and method for secure approval of operations requested by a device management system | |
| US20250337717A1 (en) | Secure request transport across transport layer connections | |
| WO2025111130A1 (en) | Systems and methods to perform end to end encryption | |
| Dočár | Bezpečnostní řešení pro cloudové technologie |